Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Information Security - MaRDI portal

Information Security

From MaRDI portal
Publication:5493180

DOI10.1007/11556992zbMath1159.68444OpenAlexW4241272628MaRDI QIDQ5493180

Helger Lipmaa

Publication date: 20 October 2006

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11556992




Related Items (23)

Selling multiple secrets to a single buyerPrivacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing schemeSingle-server private information retrieval with sublinear amortized timeSublinear secure computation from new assumptionsPrivacy-enhanced attribute-based private information retrieval\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHSomewhere statistical soundness, post-quantum security, and SNARGsTwo Generic Constructions of Probabilistic Cryptosystems and Their ApplicationsNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalA communication-efficient private matching scheme in client-server modelOn Basing Private Information Retrieval on NP-HardnessOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMSecurity and privacy aspects in MapReduce on clouds: a surveyPrivate multiparty sampling and approximation of vector combinationsVerifiable single-server private information retrieval from LWE with binary errorsPrivate information retrieval with sublinear online timeAnother Look at Extended Private Information Retrieval ProtocolsSimulatable Adaptive Oblivious Transfer with Statistical Receiver’s PrivacyA Simpler Rate-Optimal CPIR ProtocolFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsPrivate Information Retrieval Using Trusted HardwareSome Open Problems in Information-Theoretic Cryptography




This page was built for publication: Information Security